Cutting Edge AI deployed with easy fast and secure integration

Intenseye requires no hardware investment. Our client software integrates with your existing CCTV infrastructure within minutes and establishes a secure connection with the scalable Intenseye AI-Cloud Platform.

Software Architecture

Intenseye has 5 main components as below:

  • Intenseye Client Software – for camera integrations
  • AI Stack – for real-time video processing
  • Backend – for transmitting the AI output, managing APIs and databases
  • Static Media Storage – for storing the alert images/videos and AI training images
  • Application Dashboard – for users to manage and track overall EHS performance

Camera Compatibility

Intenseye works with 90% of the IP Cameras produced and distributed worldwide!

We connect existing camera infrastructure in the facilities. Our software works with almost any camera that supports h.264 video encoding and RTSP streaming protocol, which is almost all of them currently available on the market. And these protocols are right now a standard that is implemented by all major camera producers.

As long as you have IP cameras connected to a network in your CCTV system, we are pretty sure that we can integrate with them.

Bandwidth

Do not worry about bandwidth usage. We have ways to keep the data usage minimum, and Intenseye AI can work even with low-resolution CCTV footage. We come up with an accurate bandwidth usage estimation and work with you to decrease the cost. You can check how to decrease the bandwidth consumption of your network cameras here.

Our solution has been strategically built to ensure bandwidth consumption is at a minimum. We work with you to ensure create a bandwidth estimate, and limit usage as much as possible.

Cloud

Intenseye runs on the cloud and integrates with your cameras in hours. When it is compared to on-premise solutions, it takes only weeks for Intenseye to go live a large-scale, global roll-out.

On Premise

Intenseye can deploy its AI stack into your organization’s on-premise GPU servers. We call it hybrid on-premise deployment, where your data is analyzed within the facility while the output of the AI is still served on Intenseye’s cloud-hosted web dashboard.

Secure by Default

Intenseye applies encryptions to data in transit and at rest to all stored and processed customer data. The encryption in the Intenseye Client Software is applied before your CCTV data leaves the facility network and continues until the data is destroyed. Intenseye never records your CCTV footage, it stores only the alert images and alert videos. Alerts are only retained per your specific company policy. Intenseye can integrate with your active directory and provide SSO logins.

Data Segregation and Retention

Intenseye’s system ties each user’s ID with exactly one tenant, which is then used to access the Intenseye Service. All the objects are tenant-based so every time a new object is created it is irrevocably linked to the user’s tenant. The Intenseye system manages these links automatically and restricts access to every object based on user ID, user role, and permissions and their respective tenant. When a user requests any sort of data, the system automatically applies a tenancy filter to ensure that it retrieves only information corresponding to the user’s tenant.

Encryption in-transit and at-rest

Intenseye encrypts every attribute of customer data within the application before it is stored in our database. Intenseye relies on the Advanced Encryption Standard algorithm with a key size of 256 bits. User’s access Intenseye via the internet, protected by Transport Layer Security (TLS). This secures network traffic from passive eavesdropping, active tampering, and forgery of messages.

Regular 3rd Party Penetration Tests

Vulnerability assessments and penetration testing of the Intenseye network infrastructure are also evaluated and conducted on a regular basis by both internal Intenseye resources and external third-party vendors.

Data Backups and Disaster Recovery

We have developed a Disaster Recovery Plan that covers emergency and nonemergency conditions to ensure that the company will be able to continue supporting its customers. Intenseye has defined a mature approach to ensure that its information and data is backed up securely and frequently, and that its restoration occurs in the most timely and efficient manner possible.

Enterprise SSO Integrations

Intenseye security access is role-based and supports SAML for single-sign-on (SSO). Intenseye allows customers to set up different authentication requirements for different user populations. Intenseye also enables users to select an authentication type in situations where organizations wish to use multiple authentication types for users due to geographical and/or organizational variances.

Training and Awareness

All employees within Intenseye are to undergo annual security awareness training initiatives to ensure they stay abreast of significant security issues that pose a credible threat to the organization as a whole, including, but not limited to, Intenseye’s network infrastructure and all supporting system resources. The training and awareness program is reviewed on at least an annual basis to ensure that it is effective for the organization’s current and future state.

Privacy by design

Privacy is a non-negotiable and a founding principle for us at Intenseye. We are GDPR (General Data Protection Regulation) complaint and only retain data, as per your specific company policy. Facial blurring is used in our processes to prevent retaliation, and protect the privacy of workers.

  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default
  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default
  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default
  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default
  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default
  • Regular 3rd party AI ethics reviews
  • Visibility and Transparency
  • Instant disposal of analysed frames
  • Face blurring by default

Smart device Integrations

Intenseye can connect with various smart devices and provide API notification integration to trigger existing smart speakers in your facility. For example, when a forklift driver begins driving above your defined speed limit; an automated audio warning is triggered to help the worker correct their unsafe action.

Smart Plugs

Intenseye can integrate with smart plugs, to strengthen your alert system. For example, You can turn on an indicator light when two forklifts are approaching each other from a blind corner.

Network Speakers

Intenseye can connect to network speakers to trigger customized audio messages, to help correct unsafe behaviors in real-time. For example, if a pedestrian is walking under a suspended load, an audio message will notify them of the immediate danger.

API Notifications

Intenseye can send real-time API notifications to your established engineering control systems. For example, this integration can notify Intenseye if a machine is safe to enter, based on its current operating status. If the area is determined to be unsafe, an alert will be triggered. The triggered alert can also be sent as a notification to the web service or API running on the facility. To enable this API / Web Service integration, custom development is needed and network policies must be applied. It is not a ready-to-use feature.

Schedule a Demo